Toreon’s whiteboard hacking course teaches a practical methodology to perform threat modeling. The course combines pragmatic approach to threat model theory with techniques for each threat model step. This enables attendees to handle any threat model in real life.
In “Deep dive into fuzzing” we will be covering a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs.
end header left
1/2 right 1
end 1/2 right 1
1/2 left 1
end 1/2 left 1
cta
end cta
headline
end headline
1/1 panel
end 1/1 panel
2/2 content
end 2/2 content
3/3 content
end 3/3 content
2/2 panel
end 2/2 panel
3/3 panel
end 3/3 panel
profile
end profile
contact
end contact
1/2 left 2
end 1/2 left 2
1/2 right 2
end 1/2 right 2
header right
end header right
content right
end content right
content left
end content left
quote
end quote
1/3 left
end 1/3 left
1/3 right
end 1/3 right
1/1 content
end 1/1 content
footer
end footer
@44CON
About 44CON
Since 2011 we've been breaking things, highlighting flaws and presenting the latest international research in London, UK. We have gone online for the time being.